Adnan Akhunzada

Orcid: 0000-0001-8370-9290

According to our database1, Adnan Akhunzada authored at least 90 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Design and performance of an AI-enabled threat intelligence framework for IoT-enabled autonomous vehicles.
Comput. Electr. Eng., 2024

LPN-IDD: A Lightweight Pyramid Network for Image Deraining and Detection.
IEEE Access, 2024

Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches.
IEEE Access, 2024

2023
Analyzing the Impact of Active Attack on the Performance of the AMCTD Protocol in Underwater Wireless Sensor Networks.
Sensors, March, 2023

Comparative study of SPI success factors in global and in-house environment for large-scale software companies.
PeerJ Comput. Sci., 2023

Toward Performance and Energy-Efficient Edge-of-Things.
IT Prof., 2023

Deep AI-Powered Cyber Threat Analysis in IIoT.
IEEE Internet Things J., 2023

An Empirical Study to Investigate the Impact of Factors Influencing Knowledge Sharing in Virtual Teams.
IEEE Access, 2023

Optimizing Document Classification: Unleashing the Power of Genetic Algorithms.
IEEE Access, 2023

Exploring the Significance of Publication-Age-Based Parameters for Evaluating Researcher Impact.
IEEE Access, 2023

Comprehensive Evaluation of Publication and Citation Metrics for Quantifying Scholarly Influence.
IEEE Access, 2023

DHSDJArch: An Efficient Design of Distributed Heterogeneous Stream-Disk Join Architecture.
IEEE Access, 2023

The Impact of Mitigation Strategies for Socio-Cultural Distance Issues in GSD: An Empirical Study.
IEEE Access, 2023

Risk Factors and Practices for the Development of Open Source Software From Developers' Perspective.
IEEE Access, 2023

SAppKG: Mobile App Recommendation Using Knowledge Graph and Side Information-A Secure Framework.
IEEE Access, 2023

Delay Optimization in LoRaWAN by Employing Adaptive Scheduling Algorithm With Unsupervised Learning.
IEEE Access, 2023

Enhancing Performance of Movie Recommendations Using LSTM With Meta Path Analysis.
IEEE Access, 2023

Evaluating the Effectiveness of Author-Count Based Metrics in Measuring Scientific Contributions.
IEEE Access, 2023

Machine Learning Approach for Effective Ranking of Researcher Assessment Parameters.
IEEE Access, 2023

Stock Price Prediction using CuDNNLSTM and multiple CNN layers.
Proceedings of the IEEE International Conference on Artificial Intelligence, 2023

2022
FIPAM: Fuzzy Inference Based Placement and Migration Approach for NFV-Based IoTs.
IEEE Trans. Netw. Serv. Manag., December, 2022

Secure Distributed Mobile Volunteer Computing with Android.
ACM Trans. Internet Techn., 2022

Dynamic link adaptation for filterband multicarrier in networks with diverse service quality and throughput requirements.
Telecommun. Syst., 2022

Lightweight Internet of Things Botnet Detection Using One-Class Classification.
Sensors, 2022

Automatic Modulation Recognition Based on the Optimized Linear Combination of Higher-Order Cumulants.
Sensors, 2022

5G/SDR-Assisted Cognitive Communication in UAV Swarms: Architecture and Applications.
IT Prof., 2022

MalDroid: Secure DL-enabled intelligent malware detection framework.
IET Commun., 2022

Proactive Defense for Fog-to-Things Critical Infrastructure.
IEEE Commun. Mag., 2022

FineCodeAnalyzer: Multi-Perspective Source Code Analysis Support for Software Developer Through Fine-Granular Level Interactive Code Visualization.
IEEE Access, 2022

Model to Cope With Requirements Engineering Issues for Software Development Outsourcing.
IEEE Access, 2022

Research Perspectives and Challenges of Blockchain for Data-Intensive and Resource-Constrained Devices.
IEEE Access, 2022

An Attention-Based ResNet Architecture for Acute Hemorrhage Detection and Classification: Toward a Health 4.0 Digital Twin Study.
IEEE Access, 2022

Prediction of Pakistani Honey Authenticity Through Machine Learning.
IEEE Access, 2022

A Tacit-Knowledge-Based Requirements Elicitation Model Supporting COVID-19 Context.
IEEE Access, 2022

Correction to "Performance Evaluation of LoRaWAN for Green Internet of Things".
IEEE Access, 2022

2021
Dynamic Priority Real-Time Scheduling on Power Asymmetric Multicore Processors.
Symmetry, 2021

TARS: A Novel Mechanism for Truly Autonomous Resource Selection in LTE-V2V Mode 4.
Sensors, 2021

Fake news outbreak 2021: Can we stop the viral spread?
J. Netw. Comput. Appl., 2021

Power and Performance Efficient SDN-Enabled Fog Architecture.
IT Prof., 2021

SOK: Fake News Outbreak 2021: Can We Stop the Viral Spread?
CoRR, 2021

A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT).
Comput. Commun., 2021

CFFD-MAC: A Hybrid MAC for Collision Free Full-Duplex Communication in Wireless Ad-Hoc Networks.
IEEE Access, 2021

A Conceptual Model to Support the Transmuters in Acquiring the Desired Knowledge of a Data Scientist.
IEEE Access, 2021

A Dynamic Robust DL-Based Model for Android Malware Detection.
IEEE Access, 2021

An Empirical Investigation of Factors Causing Scope Creep in Agile Global Software Development Context: A Conceptual Model for Project Managers.
IEEE Access, 2021

2020
Securing Cyberspace of Future Smart Cities with 5G Technologies.
IEEE Netw., 2020

QoS-aware service provisioning in fog computing.
J. Netw. Comput. Appl., 2020

SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT).
Comput. Commun., 2020

Empirical evaluation and study of text stemming algorithms.
Artif. Intell. Rev., 2020

A Priori Multiobjective Self-Adaptive Multi-Population Based Jaya Algorithm to Optimize DERs Operations and Electrical Tasks.
IEEE Access, 2020

Hybrid Deep Learning: An Efficient Reconnaissance and Surveillance Detection Mechanism in SDN.
IEEE Access, 2020

A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks.
IEEE Access, 2020

A Dynamic DL-Driven Architecture to Combat Sophisticated Android Malware.
IEEE Access, 2020

Orchestrating SDN Control Plane towards Enhanced IoT Security.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

2019
Towards augmented proactive cyberthreat intelligence.
J. Parallel Distributed Comput., 2019

Energy and performance aware fog computing: A case of DVFS and green renewable energy.
Future Gener. Comput. Syst., 2019

A comparative review of Urdu stemmers: Approaches and challenges.
Comput. Sci. Rev., 2019

A Novel Internet of Things-Centric Framework to Mine Malicious Frequent Patterns.
IEEE Access, 2019

Performance Evaluation of LoRaWAN for Green Internet of Things.
IEEE Access, 2019

Deep Learning based Ensemble Convolutional Neural Network Solution for Distributed Denial of Service Detection in SDNs.
Proceedings of the UK/China Emerging Technologies, 2019

An Effective Android Ransomware Detection Through Multi-Factor Feature Filtration and Recurrent Neural Network.
Proceedings of the UK/China Emerging Technologies, 2019

Exploring IoT Applications for Disaster Management: Identifying Key Factors and Proposing Future Directions.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019

Scheduling Algorithms for High-Performance Computing: An Application Perspective of Fog Computing.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019

Internet Traffic Flow Analysis in Fog Computing: An Experimental Case Study.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019

Seven Pillars to Achieve Energy Efficiency in High-Performance Computing Data Centers.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019

2018
A Comprehensive Analysis of Congestion Control Protocols in Wireless Sensor Networks.
Mob. Networks Appl., 2018

NPRA: Novel Policy Framework for Resource Allocation in 5G Software Defined Networks.
EAI Endorsed Trans. Mob. Commun. Appl., 2018

Implications of deep learning for the automation of design patterns organization.
J. Parallel Distributed Comput., 2018

An improved Urdu stemming algorithm for text mining based on multi-step hybrid approach.
J. Exp. Theor. Artif. Intell., 2018

A Dynamic Replication Aware Load Balanced Scheduling for Data Grids in Distributed Environments of Internet of Things.
Ad Hoc Sens. Wirel. Networks, 2018

Evaluation of Propagation Path Delay Using 3D Scattered Model in LoRaWAN.
Ad Hoc Sens. Wirel. Networks, 2018

Taxonomy of Factors Causing Integration Failure during Global Software Development.
IEEE Access, 2018

Social Internet of Vehicles: Complexity, Adaptivity, Issues and Beyond.
IEEE Access, 2018

Trust and Reputation Management in Healthcare Systems: Taxonomy, Requirements and Open Issues.
IEEE Access, 2018

Rigorous Analysis and Evaluation of Specific Absorption Rate (SAR) for Mobile Multimedia Healthcare.
IEEE Access, 2018

2017
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification.
IEEE Trans. Inf. Forensics Secur., 2017

Formal modeling and verification of security controls for multimedia systems in the cloud.
Multim. Tools Appl., 2017

Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges.
J. Netw. Comput. Appl., 2017

Toward Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open Issues.
IEEE Commun. Mag., 2017

A high-level domain-specific language for SIEM (design, development and formal verification).
Clust. Comput., 2017

Reducing Power Consumption in Wireless Body Area Networks: A Novel Data Segregation and Classification Technique.
IEEE Consumer Electron. Mag., 2017

2016
Formal Verification of the xDAuth Protocol.
IEEE Trans. Inf. Forensics Secur., 2016

Secure and dependable software defined networks.
J. Netw. Comput. Appl., 2016

Survey on Network Virtualization Using OpenFlow: Taxonomy, Opportunities, and Open Issues.
KSII Trans. Internet Inf. Syst., 2016

A survey on Test Suite Reduction frameworks and tools.
Int. J. Inf. Manag., 2016

2015
Network-centric performance analysis of runtime application migration in mobile cloud computing.
Simul. Model. Pract. Theory, 2015

Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions.
J. Netw. Comput. Appl., 2015

Impact analysis and change propagation in service-oriented enterprises: A systematic review.
Inf. Syst., 2015

Remote Data Auditing in Cloud Computing Environments: A Survey, Taxonomy, and Open Issues.
ACM Comput. Surv., 2015

Securing software defined networks: taxonomy, requirements, and open issues.
IEEE Commun. Mag., 2015


  Loading...